Skip to content
View dhn's full-sized avatar
☠️
"><svg/onload=alert(1)>
☠️
"><svg/onload=alert(1)>

Block or report dhn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

PIC lsass dumper using cloned handles

C 580 103 Updated Oct 18, 2022

A set of Linux binary exploitation tasks for beginners on various architectures

Python 531 93 Updated Dec 26, 2021

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,281 342 Updated Feb 16, 2025

A collection of links related to Linux kernel security and exploitation

5,860 1,000 Updated Mar 3, 2025

VirtualBox 3D exploits & PoCs

Python 161 39 Updated Jan 24, 2019

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,413 1,376 Updated Oct 28, 2024

Universal command-line interface for SQL databases

Go 9,293 362 Updated Mar 5, 2025

Exercises to learn how to fuzz with American Fuzzy Lop

C 1,249 198 Updated Oct 12, 2022

This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate. The objective is to simplify as much as possible t…

Python 284 43 Updated Jan 15, 2025

Linux Exploits

C 138 51 Updated Jun 9, 2015

Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.

1,766 232 Updated Jun 8, 2019

A repository for learning various heap exploitation techniques.

C 7,598 1,173 Updated Mar 17, 2025

Easy parallel execution of commands with live feedback

Go 489 14 Updated Jan 2, 2021

Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.

Python 3,053 275 Updated Aug 31, 2021

Metasploit Framework

Ruby 35,169 14,229 Updated Mar 27, 2025

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,669 24,228 Updated Mar 27, 2025

Course materials for Modern Binary Exploitation by RPISEC

C 5,629 894 Updated Dec 9, 2021

CTF framework and exploit development library

Python 12,447 1,741 Updated Mar 24, 2025

UNIX-like reverse engineering framework and command-line toolset

C 21,401 3,059 Updated Mar 26, 2025

PEDA - Python Exploit Development Assistance for GDB

Python 5,972 815 Updated Jul 29, 2024
Showing results